Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

DEAD#VAX malware campaign deploys AsyncRAT via VHD phishing files hosted on IPFS

China-linked Amaranth-Dragon exploits WinRAR flaws for espionage

European Commission launches €605 million Africa Initiative IV

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » DEAD#VAX malware campaign deploys AsyncRAT via VHD phishing files hosted on IPFS
Identity

DEAD#VAX malware campaign deploys AsyncRAT via VHD phishing files hosted on IPFS

userBy userFebruary 4, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Rabi LakshmananFebruary 4, 2026Malware/Endpoint Security

Threat hunters have revealed details of a new stealth malware campaign called DEAD#VAX. The campaign combines “disciplined techniques and sophisticated exploitation of legitimate system functionality” to bypass traditional detection mechanisms and deploy a remote access Trojan (RAT) known as AsyncRAT.

“This attack leverages IPFS-hosted VHD files, extreme script obfuscation, runtime decryption, and injection of in-memory shellcode into a trusted Windows process, never dropping the decrypted binary to disk,” Securonix researchers Akshay Gaikwad, Shikha Sangwan, and Aaron Beardslee said in a report shared with The Hacker News.

AsyncRAT is an open-source malware that provides attackers with extensive control over compromised endpoints, allowing for monitoring and data collection through keylogging, screen and webcam capture, clipboard monitoring, file system access, remote command execution, and persistence across reboots.

The infection sequence begins with a phishing email that delivers a virtual hard disk (VHD) hosted on a distributed InterPlanetary Filesystem (IPFS) network. The VHD file is disguised as a purchase order PDF file to deceive the target.

This multi-stage campaign is funded to leverage Windows Script Files (WSF), highly obfuscated batch scripts, and self-analyzing PowerShell loaders to deliver encrypted x64 shellcode. The shellcode in question is AsyncRAT, which is injected directly into a trusted Windows process and runs entirely in memory, effectively minimizing on-disk forensic artifacts.

“Once downloaded, when a user double-clicks to open this PDF-looking file, it mounts as a virtual hard drive,” the researchers explained. “The use of VHD files is a very specific and effective evasion technique used in modern malware campaigns. This behavior illustrates how VHD files can bypass certain security controls.”

A WSF script residing in the newly mounted drive “E:\”, when executed by the victim, drops and executes a hidden batch script, assuming it is a PDF document. This script first performs a series of checks to ensure that it is not running within a virtual or sandbox environment and has the necessary permissions to proceed further.

Once all conditions are met, the script releases the PowerShell-based process injector and persistence module. This module is designed to validate the execution environment, decrypt embedded payloads, set persistence using scheduled tasks, and ultimately inject malware into Microsoft-signed Windows processes (such as RuntimeBroker.exe, OneDrive.exe, taskhostw.exe, and sihost.exe) to avoid writing artifacts to disk.

The PowerShell component lays the foundation for a “stealthy and resilient execution engine” that allows the Trojan to run entirely in memory and blend into legitimate system activity, thereby allowing long-term access to the compromised environment.

To further increase its degree of stealth, the malware controls execution timing and uses sleep intervals to throttle execution to reduce CPU usage, avoid suspicious rapid Win32 API activity, and reduce runtime behavior anomalies.

“Modern malware attacks increasingly rely on trusted file formats, script exploitation, and memory-resident execution to evade traditional security controls,” the researchers said. “Rather than distributing a single malicious binary, attackers are now constructing multi-stage execution pipelines that appear benign when analyzed individually. This change makes detection, analysis, and incident response significantly more difficult for defenders.”

“In this particular infection chain, AsyncRAT’s decision to deliver it as an encrypted, memory-resident shellcode greatly increases its stealth characteristics. The payload never appears on disk in a recognizable executable format, and instead runs within the context of a trusted Windows process. This fileless execution model significantly increases the difficulty of detection and forensic reconstruction, allowing AsyncRAT to operate with less risk of detection through traditional endpoint security controls.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleChina-linked Amaranth-Dragon exploits WinRAR flaws for espionage
user
  • Website

Related Posts

China-linked Amaranth-Dragon exploits WinRAR flaws for espionage

February 4, 2026

Orchid Security brings continuous identity observability to enterprise applications

February 4, 2026

How early decisions shape incident response investigations

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

DEAD#VAX malware campaign deploys AsyncRAT via VHD phishing files hosted on IPFS

China-linked Amaranth-Dragon exploits WinRAR flaws for espionage

European Commission launches €605 million Africa Initiative IV

Orchid Security brings continuous identity observability to enterprise applications

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.